Administrative evaluation of intrusion detection system

  • Authors:
  • Xinli Wang;Alex Kordas;Lihui Hu;Matt Gaedke;Derrick Smith

  • Affiliations:
  • Michigan Tech University, Houghton, MI, USA;Michigan Tech University, Houghton, MI, USA;Michigan Tech University, Houghton, MI, USA;Michigan Tech University, Houghton, MI, USA;Michigan Tech University, Houghton, MI, USA

  • Venue:
  • Proceedings of the 2nd annual conference on Research in information technology
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Due to the complexity of intrusion detection systems and their application in security architectures, there is a need to objectively assess intrusion detection systems in the perspective of system and network administration in order to select a right product which is a good fit to a specific design. In this research, we have developed a methodology to evaluate intrusion detection systems in a simulated environment. The environment is built with a combination of physical and virtual machines. Network traffic is simulated with baseline activities, which is characterized with web browsing and normal user activities, benchmark and actual intrusion attacks. Different tools are employed to measure CPU load, memory need, bandwidth constraint and computer memory input/output. Results show considerable differences among tested intrusion detection systems.